首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Ethical pluralism and global information ethics   总被引:2,自引:1,他引:1  
A global information ethics that seeks to avoid imperialistic homogenization must conjoin shared norms while simultaneously preserving the irreducible differences between cultures and peoples. I argue that a global information ethics may fulfill these requirements by taking up an ethical pluralism – specifically Aristotle’s pros hen [“towards one”] or “focal” equivocals. These ethical pluralisms figure centrally in both classical and contemporary Western ethics: they further offer important connections with the major Eastern ethical tradition of Confucian thought. Both traditions understand ethical judgment to lead to and thus require ethical pluralism – i.e., an acceptance of more than one judgment regarding the interpretation and application of a shared ethical norm. Both traditions invoke notions of resonance and harmony to articulate pluralistic structures of connection alongside irreducible differences. Specific examples within Western computer and information ethics demonstrate these pluralisms in fact working in praxis. After reviewing further resonances and radical differences between Western and Eastern views, I then argue that emerging conceptions of privacy and data privacy protection laws in China, Hong Kong, Japan, and Thailand in fact constitute a robust, pros hen pluralism with Western conceptions. In both theory and in praxis, then, this pluralism thus fulfills the requirement for a global information ethics that holds shared norms alongside the irreducible differences between cultures and peoples.  相似文献   

2.
This paper deals with intercultural aspects of privacy, particularly with regard to differences between Japanese and Western conceptions. It starts with a reconstruction of the genealogy of Western subjectivity and human dignity as the basic assumptions underlying Western views on privacy. An analysis of the Western concept of informational privacy is presented. The Japanese topic of ‘‘denial of self” (Musi) as well as the concepts of Seken, Shakai and Ikai (as analyzed by the authors of the companion piece on privacy in Japan) give rise to intercultural comparisons. The paper addresses the question of privacy in cyberspace and mass media. Finally the question of freedom of speech is related to the Japanese concepts of Ohyake and Watakusi.  相似文献   

3.
KDD: The challenge to individualism   总被引:1,自引:1,他引:0  
KDD (Knowledge Discovery in Databases) confronts us withphenomena that can intuitively be grasped as highly problematic, but arenevertheless difficult to understand and articulate. Many of theseproblems have to do with what I call the ``deindividualization of theperson': a tendency of judging and treating persons on the basis ofgroup characteristics instead of on their own individual characteristicsand merits. This tendency will be one of the consequences of theproduction and use of group profiles with the help of KDD. Currentprivacy law and regulations, as well as current ethical theoryconcerning privacy, start from too narrow a definition of ``personaldata' to capture these problems. In this paper, I introduce the notionof ``categorical privacy' as a starting point for a possible remedy forthe failures of the current conceptions of privacy. I discuss some waysin which the problems relating to group profiles definitely cannot besolved and I suggest a possible way out of these problems. Finally, Isuggest that it may take us a step forward if we would begin to questionthe predominance of privacy norms in the social debate on informationtechnologies and if we would be prepared to introduce normativeprinciples other than privacy rules for the assessment of newinformation technologies. If we do not succeed in articulating theproblems relating to KDD clearly, one day we may find ourselves in asituation where KDD appears to have undermined the methodic andnormative individualism which pervades the mainstream of morality andmoral theory.  相似文献   

4.
Recent anthropological analyses of Chinese attitudes towards privacy fail to pay adequate attention to more ordinary, but more widely shared ideas of privacy – ideas that, moreover, have changed dramatically since the 1980s as China has become more and more open to Western countries, cultures, and their network and computing technologies. I begin by reviewing these changes, in part to show how contemporary notions of privacy in China constitute a dialectical synthesis of both traditional Chinese emphases on the importance of the family and the state and more Western emphases on individual rights, including the right to privacy. This same synthesis can be seen in contemporary Chinese law and scholarship regarding privacy. A review of recent work in philosophical ethics demonstrates that information ethics in China is in its very early stages. In this work, privacy is justified as an instrumental good, rather than an intrinsic good. I argue by way of conclusion that privacy protections will continue to expand in China, in part under the pressures of globalization, increasing trade with and exposure to Western societies, and the increasing demands for Western-style individual privacy by young people. Even so, I argue that these emerging conceptions of privacy will remain distinctively Chinese – i.e., they will retain a basic consistency with traditional Chinese values and approaches.  相似文献   

5.
Collaborative frequent itemset mining involves analyzing the data shared from multiple business entities to find interesting patterns from it. However, this comes at the cost of high privacy risk. Because some of these patterns may contain business-sensitive information and hence are denoted as sensitive patterns. The revelation of such patterns can disclose confidential information. Privacy-preserving data mining (PPDM) includes various sensitive pattern hiding (SPH) techniques, which ensures that sensitive patterns do not get revealed when data mining models are applied on shared datasets. In the process of hiding sensitive patterns, some of the non-sensitive patterns also become infrequent. SPH techniques thus affect the results of data mining models. Maintaining a balance between data privacy and data utility is an NP-hard problem because it requires the selection of sensitive items for deletion and also the selection of transactions containing these items such that side effects of deletion are minimal. There are various algorithms proposed by researchers that use evolutionary approaches such as genetic algorithm(GA), particle swarm optimization (PSO) and ant colony optimization (ACO). These evolutionary SPH algorithms mask sensitive patterns through the deletion of sensitive transactions. Failure in the sensitive patterns masking and loss of data have been the biggest challenges for such algorithms. The performance of evolutionary algorithms further gets degraded when applied on dense datasets. In this research paper, victim item deletion based PSO inspired evolutionary algorithm named VIDPSO is proposed to sanitize the dense datasets. In the proposed algorithm, each particle of the population consists of n number of sub-particles derived from pre-calculated victim items. The proposed algorithm has a high exploration capability to search the solution space for selecting optimal transactions. Experiments conducted on real and synthetic dense datasets depict that VIDPSO algorithm performs better vis-a-vis GA, PSO and ACO based SPH algorithms in terms of hiding failure with minimal loss of data.  相似文献   

6.
Privacy is a serious concern to radio frequency identification (RFID) technology. Worldwide, several companies scrapped RFID projects because of high resistance from consumers and their advocacy groups – which actually demand RFID-specific privacy policies. This concern is even more acute when RFID is used in public applications; because, in general case, citizens cannot refuse to provide data, and the data collected by a government agency would offer serious threats if are shared among third parties. Limited research has been performed in this specific issue; they all agree that perceived privacy increased RFID acceptance. But, what drives privacy perceptions are yet to be researched – this study closes this research gap. In order to conduct the current research, mixed method of research approach has been adopted. In the qualitative research stage, the authors conducted two focused-group discussion sessions and eight in-depth interviews in two different countries: Australia and Bangladesh; arguing that the status, and the perceptions and tolerance of the citizens on privacy are different in these two regions. The explored factors have been examined with empirical data obtained from these two countries. It is found that, there are distinct differences in perceptions in developed and developing countries. The detail findings offer practical suggestions to the agency managers so that they can ensure better privacy of the citizens. As a significant theoretical contribution, this study enhances existing literature identifying the antecedents of privacy, which play even different roles in different cultural backgrounds.  相似文献   

7.
[目的/意义]健康信息风险和用户隐私保护是健康大数据和移动健康时代的重要议题,从信息隐私和隐私计算视角,探究移动健康管理服务使用意愿的影响因素具有重要意义。[方法/过程]本文在分析移动健康管理服务特殊性和回顾相关研究的基础上,从信息隐私和隐私计算的视角,通过模型构建、问卷调查和假设验证等实证分析过程,重点探究信息隐私等相关因素对移动健康管理服务用户行为意向的影响。[结果/结论]研究表明:显著影响移动健康管理服务使用意愿的因素有感知收益和信任;隐私顾虑对使用意愿的影响并不显著,但并不意味着用户隐私保护不重要;此外,感知隐私控制是重要的心理要素,正向影响感知收益,负向影响隐私顾虑。对移动健康管理服务商来说,应该从信息隐私保护、感知收益提升、个人隐私控制强化以及用户信任建设等方面着手,从而促进移动健康管理服务的用户使用。  相似文献   

8.
This paper deals with intercultural aspects of privacy, particularly with regard to important differences between Japanese and the Western views. This paper is based on our discussions with Rafael Capurro – a dialogue now represented by two separate but closely interrelated articles. The companion paper is broadly focused on the cultural and historical backgrounds of the concepts of privacy and individualism in “Western” worlds; our main theme focuses on different concepts of privacy in Japan and their sources in related aspects of Japanese culture. The interrelationship between our two papers is apparent in our taking up identical or similar topics in each paper. Reading our two papers in conjunction with each other will bring about deeper and broader insights into the diverse values and worldviews of Japan and Western cultures that underlie concepts of privacy that at a surface level appear to be similar  相似文献   

9.
赵焕军 《科教文汇》2020,(9):140-141
“意犹帅也”。作文之道,立意为先。题目只一个,文章千千万。好的立意能让人眼前一亮,增色不少。作为学生,不管是平时练笔还是考场作文,要在有限的时间内按照相应的规定写出令自己和老师都较为满意的作文,首先就要从立意开始。立意要不落窠臼,新颖别致,独具丰采。或变换角度,发散思维;或充分联想,反弹琵琶;或个性飞扬,关注热点。本文对多视觉审题立意的原则和具体方法进行探究,以期快速提高初中学生的习作水平。  相似文献   

10.
This paper distinguishes between two main questions regarding the notion of privacy: “What is privacy?” and “Why do/should we value privacy?”. In developing a social-ontological recognitional model of privacy (SORM), it gives an answer to the first question. According to the SORM, Privacy is a second order quality of roles within social practices. It is a function of who is or should be recognized as a “standard authority”. Enjoying standard authority means to have the right to interpret and contest role behavior and role obligations within a specific practice (first level), as well as evaluate the normative structure, the fundamental practice norms as well as the roles and their status (second level). The SORM utilizes the concept of standard authority to explicate privacy with regard to two categories that capture the relevant phenomena of privacy: decisional and informational privacy. Within a practice, an actor is said to have decisional privacy if she as a BCR does not (or does not have to) recognize bearers of accidental roles as standard authorities. Vice versa, an actor is said to enjoy informational privacy if all other BCRs (and especially data collecting actors) recognize her as a standard authority. Additionally, the requirement of mutual recognition by the practice participants as standard authorities introduces a “weak normativity” into the theory, which can be used to identify deficient privacy arrangements within practices.  相似文献   

11.
Recent disclosures suggest that many governments apply indiscriminate mass surveillance technologies that allow them to capture and store a massive amount of communications data belonging to citizens and non-citizens alike. This article argues that traditional liberal critiques of government surveillance that center on an individual right to privacy cannot completely capture the harm that is caused by such surveillance because they ignore its distinctive political dimension. As a complement to standard liberal approaches to privacy, the article develops a critique of surveillance that focuses on the question of political power in the public sphere.  相似文献   

12.
The only way to be aware of the risks and threats of Facebook, the most commonly used social networking site in the world and Turkey, is to be a careful user changing the default settings or simply not to have a Facebook account. In Turkey, there is still no study in which personal information shared though social networking sites has been evaluated in terms of privacy. For this reason, the findings obtained of this study have a great importance in the general picture of the current situation and drawing attention to the risks of the issue in Turkey where there are no legal arrangements effectively protecting the users from such sites. This study aims to investigate the Facebook privacy of information professionals who are members of KUTUP-L, and to determine the sensitivity and level of awareness of information professionals in Turkey. Facebook user profiles of 400 information professionals, all KUTUP-L members, have been analyzed in a study examining 32 different privacy settings. A privacy score has been calculated for each user, and the relations between privacy results have been analyzed. The findings at the end of the study show that information professionals in Turkey do pay attention to privacy, and most of the users change the default settings in order to protect their personal information.  相似文献   

13.
Government agencies often face trade-offs in developing initiatives that address a public good given competing concerns of various constituent groups. Efforts to construct data warehouses that enable data mining of citizens’ personal information obtained from other organizations (including sister agencies) create a complex challenge, since privacy concerns may vary across constituent groups whose priorities diverge from agencies’ e-government goals. In addition to privacy concerns, participating government agencies’ priorities related to the use of the information may also be in conflict. This article reports on a case study of the Integrated Non-Filer Compliance System used by the California Franchise Tax Board for which data are collected from federal, state, and municipal agencies and other organizations in a data mining application that aims to identify residents who under-report income or fail to file tax returns. This system pitted the public good (ensuring owed taxes are paid) against citizen concerns about privacy. Drawing on stakeholder theory, the authors propose a typology of four stakeholder groups (data controllers, data subjects, data providers, and secondary stakeholders) to address privacy concerns and argue that by ensuring procedural fairness for the data subjects, agencies can reduce some barriers that impede the successful adoption of e-government applications and policies. The article concludes that data controllers can reduce adoption and implementation barriers when e-government data mining applications rely on data shared across organizational boundaries: identify legitimate stakeholders and their concerns prior to implementation; enact procedures to ensure procedural fairness when data are captured, shared, and used; explain to each constituency how the data mining application helps to ensure distributive fairness; and continue to gauge stakeholders’ responses and ongoing concerns as long as the application is in use.  相似文献   

14.
[目的/意义]为了合理化决策,通常一个政府部门会根据业务需求向其他部门共享某类数据,为本部门管理或服务决策提供辅助参考依据。数据共享在其中至关重要,但若在没有适当预防措施的情况下就共享政务数据,将容易造成隐私信息的泄露。[方法/过程]针对政府部门间共享统计数据的场景,提出一种基于本地化差分隐私的政务数据共享方法。该方法在算法Generalized randomized response(GRR)的基础上引入数据分箱思想,通过等宽分箱将数据记录分入更小的数据域范围内,以克服当前隐私保护算法在数据域较大且数据量较少时统计误差大的问题。[结果/结论]将所提算法与GRR算法在仿真数据集和真实数据集上均进行了对比分析,实验结果表明该算法可有效降低统计误差,并能在不同分布和数据域大小下保持其效用性。  相似文献   

15.
Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and the mechanisms by which such a variance is produced will help organizations make such transitions. This paper examines whether and how privacy expectations change based on the technological platform of an information exchange. The results suggest that privacy expectations are significantly distinct when the information exchange is located on a novel technology as compared to a more established technology. Furthermore, this difference is best explained when modeled by a shift in privacy expectations rather than fully technology-specific privacy norms. These results suggest that privacy expectations online are connected to privacy offline with a different base privacy expectation. Surprisingly, out of the five locations tested, respondents consistently assign information on email the greatest privacy protection. In addition, while undergraduate students differ from non-undergraduates when assessing a social networking site, no difference is found when judging an exchange on email. In sum, the findings suggest that novel technology may introduce temporary conceptual muddles rather than permanent privacy vacuums. The results reported here challenge conventional views about how privacy expectations differ online versus offline. Traditionally, management scholarship examines privacy online or with a specific new technology platform in isolation and without reference to the same information exchange offline. However, in the present study, individuals appear to have a shift in their privacy expectations but retain similar factors and their relative importance??the privacy equation by which they form judgments??across technologies. These findings suggest that privacy scholarship should make use of existing privacy norms within contexts when analyzing and studying privacy in a new technological platform.  相似文献   

16.
“区块链+”商业模式创新整合路径   总被引:1,自引:0,他引:1       下载免费PDF全文
区块链应用领域的研究主要集中在区块链技术与传统行业的结合,也就是“区块链+”商业模式创新,这些研究成果存在大量相互矛盾之处。这是因为现有研究由区块链出发推演商业模式创新的过程中,混淆了区块链技术、区块链特征和区块链理念三个范畴。在梳理三者边界以及相互之间关系的基础上,本文通过对三种“区块链+”共享经济商业模式创新路径的对比分析,发现由区块链集成技术和发展阶段所形成的组态决定了其与具体领域结合时表现出的商业模式新特征。这些特征一般表现为数据权、隐私和数据成本等方面,即“区块链+”商业模式创新点。进一步研究发现,“区块链+”商业模式创新的方向,例如打破垄断、独立自主和合作共赢等,与区块链创生的理念相契合。由此得出“区块链+”商业模式创新的整合路径为,区块链技术组态到具体商业模式的优化创新,再到区块链理念与商业模式理念的双向影响。形成三者循环的动态变化。本研究为不同领域“区块链+”商业模式的研究提供了理论框架,也为区块链企业的发展指明了方向。  相似文献   

17.
Post-mortem privacy is becoming a vital topic of public and scholarly legal concern. Post-mortem privacy is understood as the right of a person to preserve and control what becomes of his reputation and dignity after death. The assumption that the deceased does not qualify for privacy rights, because his bodily presence has been terminated, no longer holds in our networked society. In the digital age, the phenomenon of the digital legacy that an Internet user leaves behind after his demise, has led to new challenges for the legal system. The deceased is no longer in a position to exercise human autonomy as an active agent. The article reconsiders the notion of human autonomy with regard to these digital representations. Taking the point of view that the control over personal information (also known as informational self-determination) is essential in protecting one’s privacy in the antemortem life, the article explores whether this principle may have validity in the postmortem context. Legal philosophical arguments are advanced in a discourse about the quandary if digital personae of deceased persons can be bestowed with a legal basis of personality rights and concomitantly privacy rights. Therefore much attention is given to the problem of the subject, which does not seem to be functioning in the case of the absence of a living subject. Briefly referring to novel personae, it is argued that fundamental human rights need not be limited to the rights of living human beings.  相似文献   

18.
This paper discusses privacy and the monitoring of e-mail in the context of the international nature of the modern world. Its three main aims are: (1) to highlight the problems involved in discussing an essentially philosophical question within a legal framework, and thus to show that providing purely legal answers to an ethical question is an inadequate approach to the problem of privacy on the Internet; (2) to discuss and define what privacy in the medium of the Internet actually is; and (3) to apply a globally acceptable ethical approach of international human rights to the problem of privacy on the Internet, and thus to answer the question of what is and is not morally permissible in this area, especially in light of recent heightened concerns about terrorist activities. It concludes that the monitoring of e-mail is, at least in the vast majority of cases, an unjustified infringement of the right to privacy, even if this monitoring is only aimed at preventing the commission of acts of terrorism.  相似文献   

19.
统计概念讲解方法的探讨   总被引:1,自引:0,他引:1  
吴敏良 《中国科技信息》2007,(23):226-226,229
本文针对《统计学》中概念多、概念抽象难懂的特点,就如何讲解好《统计学》中的概念进行了一些探索,并总结出了几种较为有效的讲解方法。  相似文献   

20.
日本图书馆协会通过制定完备的行业政策,充分发挥协会的领导作用和组织作用。同时,各图书馆根据法律和行业政策,普遍制定了在图书馆业务活动中保护读者隐私的具体规则和措施,使尊重读者隐私权落到实处。日本图书馆界诸多宝贵经验值得我们学习、借鉴。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号